System and method for detecting and defending computer worm
A malicious program and computer technology, applied in the field of systems that can detect and defend unknown malicious programs, and can solve problems such as differences, large system resources, and inability to do so.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] As shown in Figure 1, in a common computer system, a system 1, a target program 2, a computer operating system 3, a network connection module 4, and a file system 5 that can be executed by the computer for detecting and defending computer malicious programs are installed , Registry database 6; Also have common CPU, internal storage device and external storage device (not shown in the figure) in this computer. The target program 2 may exist in files in internal and external storage devices of the computer, as well as files or data packages downloaded and transmitted from the network. The target program 2 can run in the computer operating system 3, and can call related functions to operate the network connection module, file system, registry database and other software and hardware. The system 1 for detecting and defending against malicious computer programs can effectively monitor the process of calling related functions by the target program.
[0031] The system 1 for ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com